Algebraic aspects of cryptography / Neal Koblitz.
By: Koblitz, Neal
.
Series: Algorithms and computation in mathematics, v. 3. Publisher: Berlin : Springer-Verlag, c1998Description: ix, 206 p. : ill. ; 24 cm.ISBN: 3540634460.Subject(s): Coding theory![](/opac-tmpl/bootstrap/images/filefind.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
Item type | Current location | Call number | Copy number | Status | Notes | Date due | Barcode | Remark |
---|---|---|---|---|---|---|---|---|
Main Collection | TU External Storage-LCS | 005.8201512 KOB (Browse shelf) | 1 | Available | SOCIT, SOCIT, 560490 | 1000109362 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 |
Browsing Taylor's Library-TU Shelves Close shelf browser
No cover image available | ||||||||
005.82 WAY 2009 Disappearing cryptography : | 005.82 X6 Introduction to certificateless cryptography / | 005.82 YUE Practical cryptology and Web security / | 005.8201512 KOB Algebraic aspects of cryptography / | 005.84 HAR Viruses revealed / | 005.87 HIC 2020 Hands on hacking / | 006 Semantic multimedia analysis and processing / |
"With 7 Figures"
"With an Appendix on Hyperelliptic Curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato"
Ch. 1 Cryptography. 1. Early History. 2. The Idea of Public Key Cryptography. 3. The RSA Cryptosystem. 4. Diffie_Hellman and he Digital Signature Algorithm. 5. Secret Sharing, Coin Flipping, and Time Spent on Homework. 6. Paswords, Signatures, and Ciphers. 7. Practical Cryptosystems and Useful Impractical Ones. - Ch. 2 Complexity of Computations. 1. The Big-O Notation. 2. Length of Numbers. 3. Time Estimates. 4. P, NP, and NP_Completeness. 5. Promise Problems. 6. Randomized Algorithms and Complexity Classes. 7. Some Other Complexity Classes. - Ch. 3 Algebra. 1. Fields. 2. Finite Fields. 3. The Euclidean Algorithm for Polynomials. 4. Polynomial Rings. 5. Grobner Bases. - Ch. 4 Hidden Monomial Cryptosystems. 1. The Imai-Matsumoto System. 2. Patarin's Little Dragan. 3. Systems That Might Be More Secure. - Ch. 5 Combinatorial-Algebraic Cryptosystems. 1. History. 2. Irrelevance of Brassard's Theorem. 3. Concrete Combinatorial- Algebra Systems. 4. The Basic Computational Algebra Problem. 5. Cryptographic Version of Ideal Membership. 6. Linear Algebra Attacks. 7. Designing a Secure System. - Ch. 6 Elliptic and Hyperelliptic Cryptosystems. 1. Elliptic Curves. 2. Elliptic Curve Cryptosystems. 3. Elliptic Curve Analogues of Classical Number Theory Problems. 4. Cultural Background : Conjectures on Elliptic Curves asnd Surprising Relations with Other Problems. 5. Hyperelliptic Curves. Hyperelliptic Cryptosystems. - Appendic. An Elementary Introduction to Hyperelliptic Curves / Alfred J. Menezes, Yi-Hong Wu, Robert J. Zuccherato. 1. Basic Definitions and Properties. 2. Polynomial and Rational Functions. 3. Zeros and Poles. 4. Divisors. 5. Representing Semi-Reduced Divisors. 6. Reduced Divisors. 7. Adding Reduced Divisors. - Answers to Exercises. - Bibliography. - Subject Index.
This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyper-elliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyper-elliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. - Back cover.